This page was not yet optimized for use on mobile devices.
Extended Package for Secure Shell (SSH), Version 1.0
Web information
Status: archivedCertification date: 2016-02-19
Archived date: 2023-02-22
Scheme: 🇺🇸
Category: Other Devices and Systems
Security level: EAL1
Certification report
Extracted keywords
Protocols
SSHSecurity Assurance Requirements (SAR)
APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.1, APE_REQ.1Security Functional Requirements (SFR)
FCS_COP.1, FCS_SSH_EXT, FCS_SSHC_EXT, FCS_SSHS_EXTEvaluation facilities
Acumen SecurityFile metadata
Author | McGeady, Megan [USA] |
---|---|
Creation date | D:20171004124402-04'00' |
Modification date | D:20171004124403-04'00' |
Pages | 8 |
Creator | Acrobat PDFMaker 11 for Word |
Producer | Adobe PDF Library 11.0 |
Profile
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSAHash functions
PBKDFSchemes
MACProtocols
SSHBlock cipher modes
ECB, CBC, GCMSecurity Functional Requirements (SFR)
FCS_CKM.2.1, FCS_COP.1.1, FCS_RBG_EXT.2, FCS_TLSC_EXT.1, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_COP.1, FCS_SSH_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_SSHC_EXT.1.2, FCS_SSH_EXT.1.1, FCS_SSHC_EXT.1.4, FCS_COP, FCS_SSHC_EXT.1.8, FCS_SSHS_EXT.1.4, FCS_SSHS_EXT.1.7Certification process
out of scope, algorithms indicated as "REQUIRED" but not listed in later elements of this Extended Package is out of scope for the assurance activity for this requirement. If client is selected, then the ST must includeStandards
NIST SP 800-38A, NIST SP 800-131A, RFC 4253, RFC 5647, RFC 6668, RFC 4251, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Creation date | D:20160226095146-05'00' |
---|---|
Modification date | D:20160229134907-05'00' |
Pages | 28 |
Creator | wkhtmltopdf 0.12.2.1 |
Producer | Qt 4.8.6 |
References
- Axonius Cybersecurity Asset Management Platform v4.0-f archived
- Fortra’s GoAnywhere Managed File Transfer v6.8 archived
- Oracle Linux 7.6 active
- Oracle Linux 7.6 UEK 5 KVM & Virtualization Manager 4.3 active
- Oracle Solaris 11.4 active
- Privileged Access Security - Linux Components Including PSMP v10.4 and OPMv10.4 archived
- Red Hat Enterprise Linux 7.6 archived
- Red Hat Enterprise Linux 8.1 archived
- Red Hat Enterprise Linux 8.2 archived
- SUSE Linux Enterprise Server Version 15 SP2 active
- Venafi Trust Protection Platform v17.1 archived
- Venafi Trust Protection Platform v19.2 archived
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 112037, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 8, '/Author': 'McGeady, Megan [USA]', '/Comments': '', '/Company': '', '/CreationDate': "D:20171004124402-04'00'", '/Creator': 'Acrobat PDFMaker 11 for Word', '/Keywords': '', '/ModDate': "D:20171004124403-04'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20171004164352', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.niap-ccevs.org/pp/pp_ssh_ep_v1.0.htm#abbr_EP']}}
. - The pp_metadata property was set to
{'pdf_file_size_bytes': 216045, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 28, '/CreationDate': "D:20160226095146-05'00'", '/Creator': 'wkhtmltopdf 0.12.2.1', '/ModDate': "D:20160229134907-05'00'", '/Producer': 'Qt 4.8.6', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ["javascript:toggle('aactID-idp251472', 'link-aactID-idp251472');", "javascript:toggle('aactID-idp218208', 'link-aactID-idp218208');", 'https://www.niap-ccevs.org/pp/PP_APP_v1.1/', "javascript:toggle('aactID-idp204896', 'link-aactID-idp204896');", "javascript:toggle('aactID-idp130464', 'link-aactID-idp130464');", "javascript:toggle('aactID-idp245344', 'link-aactID-idp245344');", "javascript:toggle('aactID-idp178400', 'link-aactID-idp178400');", "javascript:toggle('aactID-idp101904', 'link-aactID-idp101904');", "javascript:toggle('aactID-idp197616', 'link-aactID-idp197616');", 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf', "javascript:toggle('aactID-idp136576', 'link-aactID-idp136576');", "javascript:toggle('aactID-idp111792', 'link-aactID-idp111792');", "javascript:toggle('aactID-idp237104', 'link-aactID-idp237104');", 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', "javascript:toggle('aactID-idp125664', 'link-aactID-idp125664');", "javascript:toggle('aactID-idp93440', 'link-aactID-idp93440');", "javascript:toggle('aactID-idp212400', 'link-aactID-idp212400');", 'https://www.niap-ccevs.org/pp/PP_OS_v4.0/', "javascript:toggle('aactID-idp192192', 'link-aactID-idp192192');", "javascript:toggle('aactID-idp227408', 'link-aactID-idp227408');", 'https://www.niap-ccevs.org/pp/PP_MDM_V2.0/', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf', "javascript:toggle('aactID-idp186592', 'link-aactID-idp186592');"]}}
. - The report_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'APE': {'APE_REQ': 1, 'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.1': 1, 'APE_REQ.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP.1': 1, 'FCS_SSH_EXT': 1, 'FCS_SSHC_EXT': 1, 'FCS_SSHS_EXT': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Acumen': {'Acumen Security': 6}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 12}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FCS': {'FCS_CKM.2.1': 2, 'FCS_COP.1.1': 3, 'FCS_RBG_EXT.2': 1, 'FCS_TLSC_EXT.1': 3, 'FCS_RBG_EXT.1': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1': 1, 'FCS_SSH_EXT.1': 1, 'FCS_SSHC_EXT.1': 2, 'FCS_SSHS_EXT.1': 2, 'FCS_SSHC_EXT.1.2': 1, 'FCS_SSH_EXT.1.1': 15, 'FCS_SSHC_EXT.1.4': 2, 'FCS_COP': 1, 'FCS_SSHC_EXT.1.8': 2, 'FCS_SSHS_EXT.1.4': 2, 'FCS_SSHS_EXT.1.7': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'PBKDF': {'PBKDF': 1}}, 'crypto_scheme': {'MAC': {'MAC': 17}}, 'crypto_protocol': {'SSH': {'SSH': 110}}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'NIST': {'NIST SP 800-38A': 1, 'NIST SP 800-131A': 2}, 'RFC': {'RFC 4253': 7, 'RFC 5647': 8, 'RFC 6668': 2, 'RFC 4251': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'algorithms indicated as "REQUIRED" but not listed in later elements of this Extended Package is out of scope for the assurance activity for this requirement. If client is selected, then the ST must include': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '03dafcfb797eddb8e9b656ee1dd162099dae09ce8566b550eab9a1dbc0cf7317', 'txt_hash': '20b6e694fcdde85bb65a4b7cffed14f277769eb25333ca83abd40e8225c765e6'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'aaa87dfa8d742949a7548279928d372d55ccdebef1ca2012149c6b2b4f4ee04d', 'txt_hash': '328206c04e19e51db8550abe3e28b67600eab8e76b65b69bb3f8b5bfcb0a9f33'}
data.
- The report_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The pp_metadata property was set to
None
. - The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_metadata property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Extended Package for Secure Shell (SSH), Version 1.0 was processed.
Raw data
{
"_id": "236bced46aeb26ba",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "236bced46aeb26ba",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_ssh_ep_v1.0.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM.1.1": 1,
"FCS_CKM.2.1": 2,
"FCS_COP": 1,
"FCS_COP.1": 1,
"FCS_COP.1.1": 3,
"FCS_RBG_EXT.1": 2,
"FCS_RBG_EXT.2": 1,
"FCS_SSHC_EXT.1": 2,
"FCS_SSHC_EXT.1.2": 1,
"FCS_SSHC_EXT.1.4": 2,
"FCS_SSHC_EXT.1.8": 2,
"FCS_SSHS_EXT.1": 2,
"FCS_SSHS_EXT.1.4": 2,
"FCS_SSHS_EXT.1.7": 1,
"FCS_SSH_EXT.1": 1,
"FCS_SSH_EXT.1.1": 15,
"FCS_TLSC_EXT.1": 3
}
},
"certification_process": {
"OutOfScope": {
"algorithms indicated as \"REQUIRED\" but not listed in later elements of this Extended Package is out of scope for the assurance activity for this requirement. If client is selected, then the ST must include": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 110
}
},
"crypto_scheme": {
"MAC": {
"MAC": 17
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 1
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"NIST": {
"NIST SP 800-131A": 2,
"NIST SP 800-38A": 1
},
"RFC": {
"RFC 4251": 1,
"RFC 4253": 7,
"RFC 5647": 8,
"RFC 6668": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/CreationDate": "D:20160226095146-05\u002700\u0027",
"/Creator": "wkhtmltopdf 0.12.2.1",
"/ModDate": "D:20160229134907-05\u002700\u0027",
"/Producer": "Qt 4.8.6",
"/Title": "",
"pdf_file_size_bytes": 216045,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
"javascript:toggle(\u0027aactID-idp93440\u0027, \u0027link-aactID-idp93440\u0027);",
"javascript:toggle(\u0027aactID-idp136576\u0027, \u0027link-aactID-idp136576\u0027);",
"javascript:toggle(\u0027aactID-idp130464\u0027, \u0027link-aactID-idp130464\u0027);",
"javascript:toggle(\u0027aactID-idp204896\u0027, \u0027link-aactID-idp204896\u0027);",
"javascript:toggle(\u0027aactID-idp101904\u0027, \u0027link-aactID-idp101904\u0027);",
"javascript:toggle(\u0027aactID-idp111792\u0027, \u0027link-aactID-idp111792\u0027);",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
"https://www.niap-ccevs.org/pp/PP_APP_v1.1/",
"javascript:toggle(\u0027aactID-idp125664\u0027, \u0027link-aactID-idp125664\u0027);",
"javascript:toggle(\u0027aactID-idp186592\u0027, \u0027link-aactID-idp186592\u0027);",
"javascript:toggle(\u0027aactID-idp197616\u0027, \u0027link-aactID-idp197616\u0027);",
"javascript:toggle(\u0027aactID-idp178400\u0027, \u0027link-aactID-idp178400\u0027);",
"javascript:toggle(\u0027aactID-idp212400\u0027, \u0027link-aactID-idp212400\u0027);",
"javascript:toggle(\u0027aactID-idp237104\u0027, \u0027link-aactID-idp237104\u0027);",
"javascript:toggle(\u0027aactID-idp245344\u0027, \u0027link-aactID-idp245344\u0027);",
"https://www.niap-ccevs.org/pp/PP_OS_v4.0/",
"javascript:toggle(\u0027aactID-idp227408\u0027, \u0027link-aactID-idp227408\u0027);",
"javascript:toggle(\u0027aactID-idp218208\u0027, \u0027link-aactID-idp218208\u0027);",
"javascript:toggle(\u0027aactID-idp192192\u0027, \u0027link-aactID-idp192192\u0027);",
"https://www.niap-ccevs.org/pp/PP_MDM_V2.0/",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf",
"javascript:toggle(\u0027aactID-idp251472\u0027, \u0027link-aactID-idp251472\u0027);"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"report_filename": "pp_ssh_ep_v1.0-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_REQ": 1,
"APE_REQ.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_COP.1": 1,
"FCS_SSHC_EXT": 1,
"FCS_SSHS_EXT": 1,
"FCS_SSH_EXT": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 12
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Acumen": {
"Acumen Security": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "McGeady, Megan [USA]",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20171004124402-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/Keywords": "",
"/ModDate": "D:20171004124403-04\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20171004164352",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 112037,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.niap-ccevs.org/pp/pp_ssh_ep_v1.0.htm#abbr_EP"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 8
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "03dafcfb797eddb8e9b656ee1dd162099dae09ce8566b550eab9a1dbc0cf7317",
"txt_hash": "20b6e694fcdde85bb65a4b7cffed14f277769eb25333ca83abd40e8225c765e6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aaa87dfa8d742949a7548279928d372d55ccdebef1ca2012149c6b2b4f4ee04d",
"txt_hash": "328206c04e19e51db8550abe3e28b67600eab8e76b65b69bb3f8b5bfcb0a9f33"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Other Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Extended Package for Secure Shell (SSH), Version 1.0",
"not_valid_after": "2023-02-22",
"not_valid_before": "2016-02-19",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "1.0"
}
}